20180813
3317
Comment:
|
2952
|
Deletions are marked like this. | Additions are marked like this. |
Line 1: | Line 1: |
## page was renamed from MeetingLogs/Security/20170605 | ## page was copied from MeetingLogs/Security/20171023 ## page was copied from MeetingLogs/Security/20171016 |
Line 4: | Line 5: |
* '''When''': Mon June 12th 2017 16:36 UTC * '''End''': 16:57 UTC |
* '''When''': Mon Oct 23rd 2017 16:31 UTC * '''End''': 16:45 UTC |
Line 14: | Line 15: |
* jjohansen | |
Line 21: | Line 21: |
* None | * jjohansen |
Line 25: | Line 25: |
* Balint Reczey (rbalint) provided debdiffs for xenial-zesty for kodi (LP: #Bug:1694249) * Balint Reczey (rbalint) provided debdiffs for trusty-zesty for wireshark (LP: #Bug:1397091) * Gianfranco Costamagna (!LocutusOfBorg) provided debdiffs for trusty-zesty for ettercap (LP: #Bug:1695722) * leosilva has joined the Ubuntu Security Team |
* None |
Line 31: | Line 28: |
* PR reviews for fixing racy profile generation * bpf caching * system-key * respond to greengrass-support interface feedback * iterate on the policy once a devmode snap is available * password-manager-service interface PR * finish overlayfs/apparmor/snaps investigation * file overlay/apparmor bugs * snappy-debug work * fix to work with journald * miscellaneous snappy policy updates PR |
* finish some snappy-debug work based on sprint feedback * snapd PR reviews * snapd layouts feature PR reviews (PR 3621) * misc snapd interface policy updates * continue uid/gid work for snap privilege dropping |
Line 43: | Line 34: |
* weekly role: happy place * curl updates * mysql updates * webkitgtk+ updates * additional security updates * sbeattie * weekly role: happy place * start work on CVE notifications for snap owners * !AppArmor work to support Debian's !AppArmor-in-Debian sprint * security update * kernel CVE triage * tyhicks * weekly role: happy place * finalize upstream work for libseccomp-golang * update the seccomp(2) man page for the kernel logging changes * eCryptfs patch review * !AppArmor work to support Debian's !AppArmor-in-Debian sprint {{{#!wiki comment * jjohansen * 4.15 !AppArmor pull request * type splitting * unix domain sockets RFC * !AppArmor bug backlog }}} * sarnold * weekly role: bug triage * !AppArmor work to support Debian's !AppArmor-in-Debian sprint * spice-vdagent MIR * pcp MIR * !ChrisCoulson * chromium-browser update to test and publish * update to rust 1.20 in all releases * artful is done * !AppArmor kernel auditing changes * ratliff |
|
Line 44: | Line 70: |
* gnutls updates * libiberty updates * additional security updates as time allows * sbeattie * weekly role: bug Triage * embargoed issue * sudo update * add UCT tracking for some new kernels * tyhicks * weekly role: CVE triage * !eCryptfs patch review (userspace and kernel) * fscrypto evaluation * seccomp patches * jjohansen * upstream linux-security-module reviews * new revision of LSM stacking patches * path based LSM changes from Tetsuo * LSS program committee duties * work with SUSE regarding the AppArmor patches for 4.13 kernel * !AppArmor kernel patch upstreaming * start preparing patches for 4.14 * sarnold * weekly role: happy place * xdelta3 mir * gdm3 mir * !AppArmor patch review to support jjohansen's upstreaming work * !ChrisCoulson * Firefox updates * sponsor chromium-browser updates * embargoed issues * ratliff * weekly role: happy place * Ubuntu Core 15 updates * CVE notifications |
* internal duties |
Line 79: | Line 72: |
* new employee tasks | * weekly role: cve triage * 12.04 ESM updates * additional security updates |
Line 84: | Line 79: |
* none | * None |
Line 87: | Line 82: |
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-06-12-16.36.moin.txt | Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-10-23-16.31.moin.txt |
Meeting
Who: SecurityTeam
When: Mon Oct 23rd 2017 16:31 UTC
End: 16:45 UTC
Where: #ubuntu-meeting on irc.freenode.net
Chaired By: Tyler Hicks (tyhicks)
Attendance
- jdstrand
- mdeslaur
- sbeattie
- tyhicks
- sarnold
- chrisccoulson
- ratliff
- leosilva
Not present
- jjohansen
Agenda
- Announcements
- None
- Weekly stand-up report (each member discusses any pending and planned future work for the week)
- jdstrand
- finish some snappy-debug work based on sprint feedback
- snapd PR reviews
- snapd layouts feature PR reviews (PR 3621)
- misc snapd interface policy updates
- continue uid/gid work for snap privilege dropping
- mdeslaur
- weekly role: happy place
- curl updates
- mysql updates
- webkitgtk+ updates
- additional security updates
- sbeattie
- weekly role: happy place
- start work on CVE notifications for snap owners
AppArmor work to support Debian's AppArmor-in-Debian sprint
- security update
- kernel CVE triage
- tyhicks
- weekly role: happy place
- finalize upstream work for libseccomp-golang
- update the seccomp(2) man page for the kernel logging changes
- eCryptfs patch review
AppArmor work to support Debian's AppArmor-in-Debian sprint
- sarnold
- weekly role: bug triage
AppArmor work to support Debian's AppArmor-in-Debian sprint
- spice-vdagent MIR
- pcp MIR
ChrisCoulson
- chromium-browser update to test and publish
- update to rust 1.20 in all releases
- artful is done
AppArmor kernel auditing changes
- ratliff
- weekly role: community
- internal duties
- leosilva
- weekly role: cve triage
- 12.04 ESM updates
- additional security updates
- jdstrand
- Highlighted packages
The Ubuntu Security team will highlight some community-supported packages that might be good candidates for updating and or triaging. If you would like to help Ubuntu and not sure where to start, this is a great way to do so. See https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures for details and if you have any questions, feel free to ask in #ubuntu-security. To find out other ways of helping out, please see https://wiki.ubuntu.com/SecurityTeam/GettingInvolved. The highlighted packages for this week are:
The Ubuntu Security team suggests that contributors look into merging Debian security updates in community-supported packages. If you would like to help Ubuntu but are not sure where to start, this is a great way to do so. See the available merges and SecurityTeam/UpdateProcedures for details on preparing Ubuntu security updates. If you have any questions, feel free to ask in #ubuntu-hardened. To find out other ways of helping out, please see SecurityTeam/GettingInvolved.
- Miscellaneous and Questions
- None
Log
Logs available at http://ubottu.com/meetingology/logs/ubuntu-meeting/2017/ubuntu-meeting.2017-10-23-16.31.moin.txt
MeetingLogs/Security/20180813 (last edited 2018-08-13 17:00:00 by emilyr)